Post on 14-Apr-2017
Love Cloud30 March 2017
Kieran McDonnell
Country Manager Vuzion Ireland
Digital transformation is the next industrial revolution
Steam, water, mechanical productionequipment
Division of labor, electricity, mass production
Electronics,IT, automated production
Blurring the physical and the digitaldivide
1784 1870 1969 2017
Industrial Revolution 4.0
About Vuzion
We can help make your business future proof
• A cloud aggregator
• Built on 20 years of delivering and selling cloud services
• A rich portfolio of cloud services
• A smart ecosystem of partners
Vuzion GTM Model
p
Operational Delivery
•Managed Service•Billing & Support
Capability Development
•Technical •Sales
Pre-Sales Engagement
•Technical review•POCs & Trials
Services & Frameworks
•Backup•Identity•IaaS/PaaS
Bespoke Solutions
•Solution Design•ISV Enablement
• Help resellers build their own solutions based around a set of defined frameworks
• Solutions based on “finished” services that can be resold
• Bespoke solution development support
• Service wraps to deliver operational efficiency
Direction on Microsoft
Julian DyerVuzion
o Cloud and Hosting Summit 2017o Reseller & Vuzion (Partner
Center)o Skype for Business updateo Security as a Serviceo Business Premium Updateo Q&A
Cloud and Hosting Summit 2017 – Bellevue Seattle
| 2017 Microsoft Cloud and Hosting Summit
Cloud Model driving Digital Transformation
Growth of SaaS and IaaS
Vuzion Partner smart ecosystem
Partner Center – Reseller update
Skype for Business – Ireland Update
Title.
Security as a Service – SMB opportunity
Security As A ServiceSECURE CONTENT
PROTECT CONTENT: CREATION, TRANSIT,
CONSUMPTION
SECURE DEVICES
WORKPLACE ISSUED OR BYOD DEVICES
GREAT EMPLOYEE EXPERIENCE
PRODUCTIVITY WITHOUT COMPROMISE
SECURE THE FRONT DOOR
IDENTITY DRIVEN SECURITY
IDENTITY IS THE NEW CONTROL PLANE: Stickiness, Future Growth (On-Prem, SalesForce, DropBox and 2600+ other SaaS, AWS, Azure)
Secure the Front Door
Leaked credentials
Infected devices
Configuration vulnerabilities
Risk-based policiesMFA Challenge Risky Logins
Block attacks
Change bad credentials
Suspicious sign-in activities
MACHINE LEARNING AND RISK PROFILING OPEN THE FRONT DOOR BASED ON RISK
Shadow IT Risk
Assessment
User
MFA
ConditionsLocation (IP range)
Device state
User group
Risk
Block access
Enforce MFA per user/per app
Allow access
Leaked credentialsInfected devices Configuration vulnerabilities
RISK BASED POLICIES
MFA Challenge Risky Logins
Block attacks
Change bad credentials
Machine-Learning Engine
Brute force attacks Suspicious sign-in activities
EXTENSIBILITYPOWER BI,SIEMREPORTING APIsNOTIFICATIONSDATA EXTRACTS
Security As A Service – Enabling SKU’s
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P2Azure Active Directory Premium P1 (included in P2)Cloud App Security
No Pre-requisites.Best Position with:1. Business Premium,2. E3 3. E5 4. Azure Deals
SECURE THE FRONT DOOR
IDENTITY DRIVEN SECURITY
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P1Cloud App SecurityAzure Information Protection P2Microsoft Intune
Pre-requisites: Office Mobile AppsBest Position with:1. Business Premium,2. E3 3. E5
SECURE CONTENT
PROTECT CONTENT: CREATION, TRANSIT, CONSUMPTION
Azure Active Directory Premium P1Microsoft Intune
No Perquisites.Best Position with:1. Business Premium,2. E3 3. E5
SECURE DEVICES
WORKPLACE ISSUED OR BYOD DEVICES
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
Azure Active Directory Premium P1
No Perquisites, up-sell with any Office 365 offer
ENABLING TECHNOLOGIES
UP-SELL/CROSS-SELL
GREAT EMPLOYEE EXPERIENCE
PRODUCTIVITY WITHOUT COMPROMISE
Microsoft Update
Jonathan EustaceMicrosoft
15new
releases
359updates
(this past year)
Packaged IPAverage Revenue: $1-$15 per user/per month4
Margin: 65%
• SharePoint-Based Vertical Workflows• Middleware for Hybrid
Synchronization• Industry-specific Workflows• Function-specific Workflows (e.g. HR,
Procurement)• Automated O365 Telemetry
(Availability & Performance) • Office Connectivity & Other Plug-Ins &
Add-ons• External Portals for End Customer
Information• Pre-Configured Dashboards
Project ServicesAverage Revenue: $2.5K-$15K4
Margin: 35%
• Cloud Readiness Assessment• Solution Analysis, Scope, & Design• Office 365 Set up and Remediation• Simple File Server Migration• Workflow Creation in SharePoint• Yammer Adoption• End User Training
Managed ServicesAverage Revenue: $5-$15+ per user/per month4
Margin: 45%
• Office 365 Tenant Management• Reactive Help Desk Support (Office, Skype for
Business, Intune, CRM Online) and interface to MSFT.
• Performance and Application Troubleshooting• Desktop & Device Management & Support• Reports & View Adjustments• Software Asset Management (licensing
management & optimization)• Security Management & Identity Protection• Office Client Connectivity Setup • Mobile Device Connectivity & Management• Web defense (restricting URLs, phishing
malware, spam)• Hybrid Environment Support (Basic
Infrastructure)• VoIP Maintenance• Regulatory Compliance via Office 365
Infrastructure
Exchange Online Skype for Business OneDrive for Business SharePoint Online Yammer
Build long-term, value-added services for Office 365
Based on an average 25 seat deal
Part
ner R
even
ue
Pitch incremental project services to light up each Office 365 workload post deployment
Add managed services to your Office 365 practice and become your customer’s outsourced IT department
Create SharePoint templates and extension apps, package as repeatable IP and monetize
Capitalize on themarket opportunity
Insights to maximize profitability
Managed services opportunity by 2018: $256B1
2018 projected worldwide Public IT cloud services revenue: $127B2
Run-rate Fastest Growing Business: $2.5B3
1. Markets and Markets : Managed Services Market worth $256.05 Billion by 2018(c) 2014 M2 COMMUNICATIONS IDC Worldwide and Regional Public IT Cloud Services 2014–2018 Forecast Oct 2014 | Doc #251730 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015
Creating Differentiation
Concurrency, 2017 http://www.concurrency.com/landing/azure-periodic-table
Project ServicesAverage Revenue: $2.5-$10K4
Margin: 35%
• Cloud Planning and Readiness Assessment
• Solution Analysis, Scope, & Design• Backup Deployment• Deployment Services • Heath Checks • Proof of Concept
Packaged IPAverage Revenue: $2.5-$7.5K4
Margin: 65%
• Automated Monitoring, Alerting, & Logging
• Middleware for Hybrid Synchronization
• Automated Backups & Disaster Recovery
• Automated Disaster Recovery Testing• Office Connectivity & Other Plug-Ins &
Add-ons• External Portals for End Customer
Information• Pre-Configured Dashboards
Managed ServicesAverage Revenue: $2.5-$10K4
Margin: 45%
• Critical Response Support• Azure Consumption Monitoring &
Optimization• Performance Monitoring & Reporting• Troubleshooting
Part
ner R
even
ue
Microsoft Azure Azure Backup Azure Recovery
Build long-term, value-added services for Backup
64% of organizations are currently purchasing backup and restoration services from partners1
$30 billion worth of smartphones are lost in the US in a year2
Nearly a third of all data stored in the cloud is made up of backup and recovery files3
Capitalize on themarket opportunity
Insights to maximize profitability
Concentrate on niches to better differentiate yourself and value-price
Look to move additional workloads to Azure over time
Build out automated tools and own IP to lessen reliance on project services and boost margins
Source: 1. BCSG, 2015 The Small business revolution: Trends in SMB Cloud Adoption enquiries@bcsg.com 2. Lookout Security, March 2012, “Lookout Predicts Americans Lose $30Billion in Smartphones a Year” permissions@readwrite.com 3. Intronis Cloud backup + Recovery , 2013 “2013 State of Cloud Backup MSPs Mission the Mark” 4. MDC Research, Microsoft Cloud Profitability Scenarios May 2015
Backupas a
Service
Creating Differentiation
On-Premises Datacenter
Automated Backup Solution
Provides customers with regular reporting on successful completion of backups
Fixed monthly fee
Includes four restores per annum
Four core pillars of the modern partner
Being Ready for GDPR
Darren RobertsVuzion
SHAREPOINT METADATA & TAXONOMIES AUTOMATED
Successful SharePoint projects are built on metadata
• SharePoint is a powerful document management system, but in order to get the return on your investment you need rich metadata added to your documents.
• Without metadata, users will struggle to find and organise their content and organisations will be unable to govern the ever-growing store of information within SharePoint.
• Whether you are migrating content into SharePoint, or looking to improve your existing sites then metadata is the difference between a successful or failed project.
Building taxonomies & adding metadata has always been a tough job
• Building taxonomies from scratch is a time-consuming trial and error prone process.
• Asking users to fill in metadata fields to save their documents to SharePoint impacts productivity and creates user adoption problems.
• Migrated content will have no metadata.
Next-generation taxonomy creation and metadata tagging TermSet uses Natural Language Processing and Machine Learning to add accurate consistent metadata to SharePoint content, without placing any burden on end users or the IT team. No manual work, it just happens.
Taxonomy CreationCreates and maintains SharePoint taxonomiesunique to your contentPowerful natural language processing ensuresyour taxonomies are accurate and always up to date
Cloud or On PremisesChoose from a software as a service or a local installation
Metadata TaggingSharePoint content is automatically tagged with rich and consistent metadataTagging can be part of a migration process or as new documents are added to a library
Packed with Powerful FeaturesLanguage analysisDocument summary generationPattern and phrase matchingConcept classification
See the following benefits to your SharePoint projectSmarter SharePoint migrationsEnrich your documents with meaningful and consistent metadata as part of your migration project
Improve your Information ArchitectureBuild your SharePoint sites to reflect the information you store and remove the need for folders and views
Supercharge SharePoint SearchDramatically improve SharePoint search by providing refinable metadata to your users
Power Compliance & WorkflowsUse metadata to drive compliance and governance of your documents and drive workflows.
Before TermSet
After TermSet
GDPR
What is GDPR?General Data Protection Regulation. A huge change for how we all handle data, PII (Personal Identifiable Information).
What happens if non-compliant?Up to €20M or 4% of global turnover (which ever is greater)
When does GDPR come into force?25th May 2018.
Who does GDPR apply to?Any organisation who hold PII on any other person or organisation
TermSet for GDPR ComplianceAddress: 77 Sixth avenuePhone number: 847-334-2345
Address: 3608 Walnut Creek RoadCity: Chicago
Company: Arnold Associates
Salary: $37,500
Person: Manuel Santiago
TermSet Customers
Protect Data & Recover fromDisaster using Microsoft Azure
Alex McLoughlinUnion Solutions
About Union Managed Services
• 10 Year pedigree transforming the largest IT Infrastructure Environments
• Data Services where your customers need them, how your customers want them.
• Our expertise is Infrastructure, Data Protection and Business Recovery, with a human touch.
• We deliver managed infrastructure on premise, from our UK datacentres or in the Microsoft Azure public.
• Our sole focus is delivering business outcomes for customers in the 100 - 1,000 seat SME marketplace.
Union Solutions Limited 2017
ManageInfrastructure
Protect Data Survive a Disaster
Our Customers
Union Solutions Limited 2017
Protect Data
Union Solutions Limited 2017
What challenges do your customers face…?
• Ransomware, user error, system failure, datacentre loss, malicious intent or degenerative IT bugs .
• Protection windows are shrinking, data is doubling, and many fail to protect data in appropriate to need.
• Trying to compete in a global economy with tech savvy consumers that expect a 24×7 always-on service
• If they lost a significant amount of data, the business would struggle to operate
• Legacy backup software is a huge problem. Proprietary software that locks data in a proprietary format.
Protect Data
Union Solutions Limited 2017
Protect Data
Union Solutions Limited 2017
VisibleMonitored 24×7x365. Daily Exception reporting showing compromised services and regular service reports delivered in a language you and the business can understand.
Specialist ExpertiseData protection has been our area of expertise for more than 20 years. Designed and built some of the most sophisticated solutions for some of the most demanding corporate environments.
Union – Data Protection as a Service
Secure and PortableProtected data is encrypted in transit and at rest. It never leaves your network. Historical copies needed for compliance demands provided to you in native format. No lock-in to proprietary software
Pay as You GrowYou pay on a consumed capacity basis. It’s an OPEX model based on per protected GB of data, with cloud enabled scale and economies.
HybridAn appliance deployed on premise, storing 31 days of backups for Instant data restore. We replicate a copy of your data between sites every night
Survive a Disaster
Union Solutions Limited 2017
What challenges are you facing…?
• A disaster can put your customer out of business.
• They need (it’s demanded) to provide evidence of continuity plans for customers of your customers and regulated industry inspectors.
• Unfortunately, most SME organisations are still playing catch up.
• Disaster Recovery is often at the back of the budget queue:
• Cost of delivering is substantial.
• Chews up cash and profitability.
• They’ve never had a disaster (yet…)
Survive a Disaster
Union Solutions Limited 2017
Survive a Disaster
Union Solutions Limited 2017
Survive a Disaster
Union Solutions Limited 2017
Cloud AutomatedRecover all IT services inside 60 minutes.Instant fail-over of any VM or Physical server to the Microsoft Azure cloud.We operate your infrastructure services all the time they’re running in Azure
Bespoke We create a Dynamic DR Runbook (invocation plan which we automated against) for each customer. Your customers are then armed with a demonstrable plan for customers, auditors, and regulators.
Union – Disaster Recovery as a Service
TestedFull test invocation every year, issuing a certificate to publish to third parties. Union manage the entire fail-over and fail-back processes.Clever technology in Azure enables us to test any server or application for DR, at anytime
ResponsiveYou pay on a consumed capacity basis. It’s an OPEX model with cloud enabled scale and economies.RPO of 60 Minutes, RTO of 60 Minutes at an SME price point (charged per protected VM + storage)
Summary
Union Solutions Limited 2017
Talk to Union and Vuzion
• Create recurring margin by selling cloud enabled managed services
• Both Products orderable through Vuzion (launching on the portal in weeks to come)
• This is a big conversation to have with customers. Multi year contracts drive significant committed income for your organisations.
• Deal registration process locks a qualified opportunity to a Vuzion partner
• Union has marketing support and expert gun slingers ready to support your sales effort to win business
Sign Documents Anytime, Anywhere, on any Device
Elaine PakesDocuSign
Drive usage and adoption to all Microsoft applications: SharePoint, Dynamics CRM, O365, MS Word, Outlook, Windows, Azure
Sign anytime, anywhere, on any device
Get approvals done, faster than ever
DocuSign
Ensure secure and compliant business processes
Fastest & most secure way to make every decision and approval digital
DOCUSIGN CONFIDENTIAL
DisconnectedSystems
ManualProcesses
Poor CustomerExperience
Consumers
Customers
Partners
Suppliers
Employees
DisconnectedSystems
ManualProcesses
Poor CustomerExperience
Consumers
Customers
Partners
Suppliers
Employees
DocuSign Digitizes Decisions & Approvals
With DocuSign
Manage digital transactions and eSignatures directly from Microsoft applications
Office 365 and SharePoint Dynamics CRM Online Windows 10|Windows Phone
Customers can sign or send agreements for signature from any
object in Dynamics CRM Online
Electronically send documents for signature(s) and manage
the documents you send from any device. Log in with Azure
AD.
1,500 Documented Use Cases and Counting – How does Office 365 fit into these use cases?
Sales Order Processing Account Provisioning Sales Compensation
Agreements Referral Agreements Reseller Agreements Field Sales Agreements New Customer Sign Ups Terms and Conditions
Event Registration Customer Communication
Approvals Mass Mailing / Email Approvals Customer Communication
Approvals Brand Compliance / Audits Event and Vendor Approvals
New Hire Paperwork Candidate NDA On/Off-boarding Checklist Employee Policy Distribution &
Signature Contractor Agreements Non-disclosure PTO Management Payroll Forms
Front Desk Sign-in Work Orders Lease Agreements Move In / Move Out Requests Parking Permits Equipment Rentals Lien Releases Site Passes and Onsite Waivers
Invoice Processing Expense Reporting Capitalization Management Audit Sign Off Policy Management Inventory Signoff Asset Transfer / Retirement Hiring Freeze Exemption M&A Documentation
Account Changes Service / Work Orders Term Changes Self Service Requests Compliance Field Service Cancellation Requests Internal Cancellation Processing
Asset Tracking Change Requests Requirements Sign Off Access Management Incident Reporting Production Change
Authorization Maintenance Authorization Order Fulfillment
Change Management Release Management Code Review Reporting Requirements Acceptance Release Scope Commitments Project Charter Templates
NDAs Contract Management Internal Compliance IP Licensing Patent Applications Board Minutes Trade Name Assignment Trademark Assignment Finance Agreements
Purchase Orders Statements of Work Master Service Agreement RFP Sign Off Supplier Compliance Competitive Procurement
Summaries Sole-Source Justifications Procurement Card Applications
Why Should
You Care?
Increase deal size for TAV. 15%
margin from MSRP
Easy to set-up, Simple to use, No implementation
needed
Increase initial deal size.
Land & expand within LoB
Average sales cycle; deals
between 5 - 50 seats < 45 days
Average Deals Closed Per Q; 63
SMB
Increase adoption usage
& penetration of MSFT
Applications
DOCUSIGN CONFIDENTIAL
Develop adoption with end customers on cloud based solutions
Increase the value attached to O365 with our additional services and differentiation
Stronger foot print with customers providing the ability to tackle many LOB/expansion use cases
Increase revenue through sales and ROI for customers
DocuSign Value Drivers to Resellers
Leverage MSFT Integrations
Existing O365 Customers
Net New Customers
Special MSFT O365 Bundle
Land & Expand
Where To Execute
Is DocuSign Legal?
DOCUSIGN CONFIDENTIAL
https://www.docusign.co.uk/how-it-works/legality/global
DOCUSIGN CONFIDENTIAL
DocuSign is the only provider with bank-grade security
Broadest Set of Security Certifications
PCI DSS 3.1Global Security Gold Standard: ISO 27001
Streamlined Process for EU Privacy Law Compliance
SSAE 16 SOC 1 Type IIAT 101 SOC 2 Type II
Data Privacy
https://trust.docusign.com/en-us/
Try it for yourself
DOCUSIGN CONFIDENTIAL
https://secure.docusign.com/demo
Organisations run on email –give it the protection it needs
Nessa LynchehaunMimecast
Session Overview
• Introduction to Mimecast
• Solution overview: understand the platform & problems we solve
• Maximising the opportunity for Partners
• Partner Resources
• Questions
Confidential |
Mimecast at a glanceFounded 2003in London, UK
Cloud services designed to ‘Make Business Email Safer’
Over 25,000 Customers
Growing at 30% YoY
MIMENasdaq Traded
97% Retention Rate
Over 7 million end users
14% Annual Turnover Invested in R&D Over 20 PB or Archive Data
Under Management
Email and three critical business risks
Vulnerability to attackYour users and email infrastructure are under constant attack from a wide range of adversaries.
Total operational dependencyTolerance for email downtime is almost zero as it costs money, damages reputations and cripples business operations.
Highest concentration of corporate dataMassive volumes of your most valuable corporate data are in email. Data loss, leakage or breach will have devastating effects.
Protect against Email Cyber Threat
Prevent Email Outages to Maintain Productivity
Eliminate Data Loss and Maintain Compliance
Reduce Cost and Complexity of Email Infrastructure
We help our customers …
Beyond the mailbox server your business needs…
ArchivingEmail and File StorageCompliancee-Discovery & Legal HoldEnterprise SearchEnd-User AccessStorage Infrastructure
SecurityEmail Gateway (MTA)Anti Virus/Anti SpamAnti MalwareAnti (Spear) PhishingEmail EncryptionData Leak PreventionSecurity Monitoring & ReportingLarge File Transfer
Clustered Mail ServersFailover Data CentersBackup & Recovery Systems
Continuity
Mimecast tackles risks and reducescomplexity
HIGH AVAILABILITY
Email is under attack
› Mimecast › Products › Email Security › Targeted Threat Protection
How Secure Is Your Infrastructure
› Mimecast › Products › Email Security › Targeted Threat Protection
Which Category do you fall under
› Mimecast › Products › Email Security › Targeted Threat Protection
91% Cyber attacks65% Unprepared37% = $1m> loss
Confidential
Top Attack Vector Impacting Global Organizations:
• Phishing• Spear Phishing• Whaling• Social Engineering
› Mimecast › Products › Email Security › Targeted Threat Protection
Ignoring the risk of spear-phishing can spell disaster
Breaches happen
Increase of23%
since 2013
Ave. cost of breach$6.5m
The results can be devastating
Ponemon, 2015
Confidential |
The anatomy of an attack
Three main attack methods:• Malicious URLs in email• Weaponized attachments• Impersonation attacks
40% of emails have an attachment
80% are potentially vulnerable PDF or office docs:
~ 50% open emails and click on links within 1 hour*
Median time to first click: 1m.22s*
233% increase in phishing URLs tracked in 1 year**
* Verizon Data Breach Report 2015 ** Cyren Cyber Threat Yearbook 2015 *** Analysis of 1 Terabyte of Mimecast platform data, 2015
Attack Stats
3% POWERPOINT documents
51% PDF documents
9%EXCELdocuments
17%WORD documents
***
› Mimecast › Products › Email Security › Targeted Threat Protection
Existing anti-spamand anti-virusis not enough
Standard Email Protection
Known threat
Targeted attack
Targeted attack
Spear-phishing Protection
Threat stopped
Security breach
Attack stopped by advanced protection layer
• Traditional email security was never designed to stop targeted attacks
• A specialized second layer of defense is needed to protect data and employees
› Mimecast › Products › Email Security › Targeted Threat Protection
Mimecast Targeted Threat Protection URL Protect
with URL rewriting and dynamic user awareness
Attachment Protectwith file transcription, on-demand and pre-emptive
sandboxing
Impersonation Protectwith dedicated detection of whaling and malware-less
phishing
Internal Email Protectwith file transcription, on-demand and pre-emptive
sandboxing
› Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat ProtectionURL Protect
• All URLs in every inbound mail are rewritten at the gateway
• On click, every click real-time scanning of destination site
• Access is granted to clean sites without delay. Access to compromised sites is blocked
• Dynamic user awareness built-in -helps build a human firewall
› Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat Protection Attachment Protect• Pre-emptive sandbox checks email
attachments pre-delivery
• Option of innovative transcription with on-demand sandbox
• Potentially harmful attachments replaced with transcribed safe versions
• Employees have instant access to safe files
• Request original via cloud-based sandbox if required
› Mimecast › Products › Email Security › Targeted Threat Protection
Targeted Threat ProtectionImpersonation Protect
Name is One of my Users Names
Domain is like one of my domains
Keyword Dictionary
Reply-to-address mismatch
Newly Observed Domain
Confidential |
Detection and remediation of security threats where the sender and recipient are on the internal network
Plus inspection of outbound emails
Internal Email Protect
Confidential |
Internal Email ProtectDefending against the three types of internal threats
• The Compromised Insider• The Careless Insider• The Malicious Insider
Confidential |
• Compromised Insider– User’s credentials stolen by attacker– Leverages organization’s web-based email to spread attack internally
or externally to partners/customers
• Careless Insider– Sending sensitive data inappropriately via email to colleagues
• Secret projects, Excel sheets with credit cards/SSNs etc…
• Malicious Insider– Purposely distributing malware or malicious URLs– Selling sensitive data to outsiders– Taking sensitive data for personal use
Example Use Cases
Confidential |
• TTP inspection for journaled internal emails
• DLP, URL, & attachment checks
• Unsafe attachment and/or emails removed from inboxes
• Adds URL & attachment checks to outbound email
Key Capabilities
› Mimecast › Products › Email Security › Targeted Threat Protection
Mimecast Targeted Threat Protection URL Protect
with URL rewriting and dynamic user awareness
Attachment Protectwith file transcription, on-demand and pre-emptive
sandboxing
Impersonation Protectwith dedicated detection of whaling and malware-less
phishing
Internal Email Protectwith file transcription, on-demand and pre-emptive
sandboxing
Maximising the opportunity for Vuzion Partners
Confidential
Partner Benefits
•Unified email solution - single platform, single AdCon•Simple licensing model – monthly buy price per user•Happy customers - over 97% customer retention•Exciting roadmap - massive Upsell opportunity•Partner Portal - all the tools you need for on-boarding and managing your customers, training and marketing resources
What does our ideal client look like?
• Any size! SaaS model allows us to scale
• We work well with any sector, but it helps if:
Their business relies on email for communication
There would be a high impact with a data breach or targeted attack
Compliance needs – data jurisdiction, retention period, data protection, tamperproof store
Confidential
Partner Resources
• Mimecast Knowledge Base & Mimecast Central https://www.mimecast.com/customer-success/
• Supporting collateral• https://www.mimecast.com/solutions/platforms/office-365/• Recommendations
• Technical Workshop/Demo• Microsoft MVP Positioning Session
Mail server migration Spam, virus & targeted attack protection
Protecting sensitive & confidential data
Protection against email downtime & data loss
Email storage & eDiscovery
Sending large files
Email access for remote users
Email branding & marketing
Compliance/regulation
Summary
Unlock a lucrative SharePointbusiness, without additionalinvestment
Nick BenhamICS / FLEX
Copyright ICS Solutions 2017
WHAT IS FLEX LITE?
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
Trusted Microsoft Gold Partner for over 20 years
• Established in 1994• Microsoft Tier 1 managed Gold Partner• Founding Partner of the Microsoft Azure Circle• UK’s First Office 365 Partner• UK’s most experienced SharePoint Partner with over 500 Projects
Copyright ICS Solutions 2017
FLEX ENTERPRISE – 70,000 USERS AND £2.7M INVESTED
Established since September 2014
FLEX - BUILT ON EXPERIENCE AND INVESTMENT
“Speedy implementation of SharePoint was our main motivating force for selecting FLEX….” Tony Foot, IT Delivery Manager, WaterAid
“Rapid deployment of SharePoint was our main driving force in selecting FLEX…...” Debbie Jupe, Senior Project Manager, WM Housing
“FLEX has allowed our end users to be much more self-sufficient with regards to content creation….” Adam Doswell, Enterprise Systems Developer, Malvern Instruments
Copyright ICS Solutions 2017
Networking
Networking
Servers
Support
Collaboration
Applications Desktop
Consulting
ServersSupport
Collaboration
Applications Desktop
Consulting
HOW DO I GROW REVENUE IN A CLOUD WORLD?
Pre-cloud revenue landscape for SME partners Post-cloud revenue landscape for SME partners
Support
Consulting
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
Value Add ISV’s
FLEX helps partners grow customer revenue in a post cloud world
Copyright ICS Solutions 2017
FLEX MAKES YOU MONEY, OUT-OF-THE-BOX
You don’t need to set up a SharePoint practice
No consulting sale, FLEX is like other ISV software
Compelling customer materials are provided
FLEX is highly affordable reducing costs by up to 90%
Good margins recurring licence and services
FLEX allows partners to quickly generate margin with low investment
Copyright ICS Solutions 2017
SOLUTION IN A BOX MARKETING IN A BOX SELLING IN A BOX DEPLOYMENT IN A BOX
Out-of-the-box software
Best-of-Breed Intranet
Next Generation Collaboration
Digital Workplace
Easy to sell (non consulting)
Software & service pricing tool
Standard demo’s etc..
Standard collateral
Sales support
Easy to market
Pre-built campaigns
Pre-built webinars
Web content
Branded collateral
Easy to deploy
Standard deployment materials
Standard training
3rd Party deployment if needed
HOW DOES THAT WORK?
FLEX provides the partner with everything they need out-of-the-box
Copyright ICS Solutions 2017
WHY DO MY CUSTOMERS NEED FLEX LITE?
Small organisations have the same need to collaborate digitally with
customers, partners and employees as large organisations but a
fraction of the budget.
FLEX uses automation technology and SME business templates to
configure Office 365 and Azure to drive user adoption for a fraction of
the time and cost of doing it manually.
ENTERPRISE
FLEX Lite gives SME’s Enterprise solutions at a realistic cost
SME
Copyright ICS Solutions 2017
WHAT DO I GET OUT-OF-THE-BOX?
Deployment Choice 1Traditional ManualINTRANET - INFORMATION WORKPLACE – SELF SERVICE
75 BUSINESS FORMS
50+ BUSINESS APPS 11 GENERIC
COLLABORATION APPS
Affordable business critical Microsoft technology for SMEs
7 DEPARTMENT HUBS
Copyright ICS Solutions 2017
WHAT CAN I DO WITH IT?
Deployment Choice 1Traditional Manual
Affordable business critical Microsoft technology for SMEs
BUSINESS COMMUNICATIONWhat’s going on in the business? Easily create news, events and articles
SELF-SERVICE COLLABORATIONAbility for end users to effortlessly share and collaborate internally and externally
SIMPLE DOCUMENTATION AND INFORMATION MANAGEMENTAbility to store and find documents easily
Copyright ICS Solutions 2017
HOW DO I USE IT?
Deployment Choice 1Traditional Manual
Deployment Choice 2FLEX Automation
Office 365 Interface Azure Interface
FLEX Business Apps
FLEX AVOIDS THE NEED TO TRAIN ORDINARY USERS IN THE OFFICE 365 OR AZURE TECHNOLOGY
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
FLEX LITE PLAN COMPARISONS
Deployment Choice 1Traditional Manual
Deployment Choice 2FLEX Automation
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
FLEX LITE PLAN COMPARISONS
Deployment Choice 1Traditional Manual
Deployment Choice 2FLEX Automation
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
WHAT DOES IT COST?
DEPLOYMENT COSTS
FLEX Enterprise
Baseline Deployment £37,000
FLEX Lite
Baseline Deployment from £5,995
Affordable business critical Microsoft technology for SMEs
Copyright ICS Solutions 2017
Deployment Choice 1Traditional Manual
FLEX Achieves the following benefits:
EXAMPLES
Affordable business critical Microsoft technology for SMEs
Join the conversation #LoveCloud